Jump to content

mx_starter

Approved members
  • Posts

    4
  • Joined

  • Last visited

About mx_starter

mx_starter's Achievements

Newbie

Newbie (1/5)

0

Reputation

  1. Hi, can you pls explain me what is the reason for the option: Don't show the banner again on the same page to be missing when the delivery method is using iFrames? And is there any way to avoid duplicating banners on a same pages with this delivery tag? Thanks.
  2. Agree. To be honest - i have no idea what this table is used for - just found the code within and that is why i pointed it out. But - the need Revive to explain how to resolve the problem still exist.
  3. Hi and HNY to all here! If you have problems with AVAST blocking the banner deliveries as described here: http://forum.revive-adserver.com/topic/91-javascript-invocation-code-marked-as-a-trojan-by-avast-224/ and here: http://forum.avast.com/index.php?topic=143666.0 you must be aware that simply upgrading to revive 3.0.2 is not enough, because the malicious JS code is probably injected in your database before the upgrade (and the upgrade script obviously does not fix this). I think revive team should explain how to remove the infection in a clear way! Until then - that procedure worked for me: 1. Stop the ad-server 2. Remove all the files under /var/cache subfolder (some of them will contain the javascript code within) 3. The affected tables in mysql are named 'audit' and 'zones' (plus prefixes in front if you use them) 4. Open the admin panel and for each of the zones: 4.1. Click on the 'Advanced' tab and remove the malicious script from the prepend/append fields, then save the changes 4.2. For each of the zones, there would be a record in the 'audit' table containing the script in its 'details' field. Delete these records and you should be fine - Avast should stop complaining from now on.
  4. I can confirm this procedure, also. My investigation showed that the code is presented in the ox_auidit table, too. Will post a separate topic in a minute...
×
×
  • Create New...